Sunday 8 December 2013

Common Methods For Hacking Computer Terminals:



 1: Denial Of Service
 2: Distributed DoSs
 3: Sniffing
 4: Spoofing
 5: SQL injection
 6: Viruses and Worms
 7: Back Doors
 8: Trojan Horses
 9: Keyloggers
 10: BruteForcing
 11: Secret Question
 12: Social Engineering
 13: Phishing
 14: Fake Messengers
 15: Cookie Stealer
 16: DNS Poisoning or PHARMING
 17: Whaling

Request a new IP address from your ISP server




 Here's how to do it in windows:
 1. Click Start
 2. Click run
 3. In the run box type cmd.exe and click OK
 4. When the command prompt opens type the following. ENTER after each new line.

 ipconfig /flushdns
 ipconfig /release
 ipconfig /renew
 exit
 5. Erase your cookies in whatever browser you are using.

Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it (our batch tipi is already posted please review it). This works if you have a Mobile Broadband connection or PPPoE .

Friday 29 November 2013

Check If Your computer was used in your absence?


Do you want to know whether your PC was used in your absence?
Just follow these simple steps:

=> Goto Run and type eventvwr.msc in the Run dialog box.

=> Events are stored in three log files: Application,Security, and System. These logs can be reviewed and archived.

=> For our purposes we want the System log. Click on “System” in the left-hand c...olumn for a list of events.

=> Look for a date and time when you weren't home and your computer should have been off.

=> You can also use this log to see how long someone was on the computer.

=> Just look at the time the computer was turned on and off for that day.

You Are done.

Tuesday 19 November 2013

Windows 8 Task Manager



The Windows 8 Task Manager has been significantly improved over previous versions of Windows.

Some of the new changes include showing a total percent usage at the top of your Processes, which makes it easier to determine total memory and CPU usage, improved Performance graphs, a Startup tab to see startup processes and their impact to system performance, and the App history tab (as shown below) that gives you the total resources an app has used over a period of time. Press Ctrl + Shift + Esc to start exploring the new Task Manager.

Know your hot corners

The corners on your screen are hot corners and give you access to different Windows features. Below, is a brief explanation of each of these corners.
Bottom Left-hand corner
The bottom left-hand hot corner of the screen will allow you to access the Start screen, if you're in the Start screen and have the Desktop open, this corner will open the Desktop from the Start screen.
Tip: Right-clicking in the left hand corner will open the power user menu.
Top-left corner of the screen
Moving the mouse to the top-left corner and then down will display all the apps running on the computer. Clicking and dragging any of these apps to the left or right-hand side of the screen will snap that app to that side of the screen. Each of these open app icons can also be right-clicked to close or snap.
Right-hand side of the screen
On the full right-hand side of the screen will be given access to the Windows Charms.

Windows 8 keyboard shortcuts



Knowing at least some of the Windows 8 keyboard shortcuts will make your Windows 8 experience much more enjoyable. Try to memorize these top Windows 8 shortcut keys.
    Press the Windows key to open the Start screen or switch to the Desktop (if open).
    Press the Windows key + D will open the Windows Desktop.
    Press the Windows key + . to pin and unpin Windows apps on the side of the screen.
    Press the Windows key + X to open the power user menu, which gives you access to many of the features most power users would want (e.g. Device Manager and Command Prompt).
    Press the Windows key + C to open the Charms.
    Press the Windows key + I to open the Settings, which is the same Settings found in Charms.
    Press and hold the Windows key + Tab to show open apps.
    Press the Windows key + Print screen to create a screen shot, which is automatically saved into your My Pictures folder.

Customize your tiles in Windows 8



Make the most of your Windows Start screen tiles by adjusting the sizes, where they are located, and what is listed.
   
Move any tile by clicking and dragging the tile. While moving a tile, if you need a larger view of the Start screen move the tile towards the top or bottom of the screen to zoom out.
   
Use your mouse wheel to scroll left-to-right through your tiles.
   
Any Desktop shortcut or program can be pinned to the Start screen by right-clicking the icon and choosing Pin to Start.
   
In the bottom right-hand corner of the start screen is a magnifying glass with tiles, click this icon to get a zoomed out view of your Start screen. In this view, if you right-click on a group of tiles you'll be given the option to name group, which can be useful if you have a group of related tiles (e.g. games). In this view, you can also click and drag a group to organize your tile groups.
   
Create a new speed bump between tile groups by moving a tile to a speed bump.
  
Resize any User tile or Live tile by right-clicking the tile and choosing resize.
   
If there is a tile you want on your Taskbar, right-click the tile and choose Pin to taskbar.
   
Show admin applications on the Start screen by clicking Settings in Charms, click Settings, and change the Show administrative tools from No to Yes.
   
In Internet Explorer 10, you can also pin any of your favorite web pages to your Start Screen.

Monday 28 October 2013

How Download Managers accelerate Downloads ?



Ever used a download manager for speeding up downloads?? Most probably these are the top managers used widely-

1) Internet Download Manager( IDM )
2) Download Accelerator Plus (DAP)
3) Free download manager
4) Orbit Downloader
5) Flashget downloader
6) Limewire Downloader

Well as they say, download mangers in reality dont exaclty accelerate your downloads.. But actually perform the following tasks to optimize your connection-

-> Dynamic segmentation of file download
-> Bandwidth optimization
-> Provide additional resume capability
-> Use your tcp protocols efficiently

Whenever we download files, by default windows downloads it from beginning and in event of crash or powerloss its lost...

#Dynamic Segmentation provides breakup of a download file to breakup the files in real time thus downloading it in parts for efficiency..

#Bandwidth of your connection is optimized for judicious allocation. for example if your download speed it 200kbps, you can assign 150kbps for downoading content and 50kbps for browsing speed thus enhancing the dual capability of browsing+downloading not efficient usally in default

#Resume capabiltiy helps us resume broken downloads and files from the last point,due to the fact framented files are stored in a special #temp area, we can relink and refresh the download addresses to resume our downloads instead of starting from the beginning.

Thus we can see how download managers help us in efficiently using the network bandwidth to its optimum... It in reality cant increase the speed offered by your ISP plan, but makes sure you get the level best out of it

Tuesday 8 October 2013

Bypass Software Trial Period Manually



1. First you have to uninstall that application whose trial period is over, and you wanna use it again.
2. Now open the “Regedit” you can open it by going to Start > Run > Regedit.
3. Navigate to HK Local Machine > Software > Your Software name.
4. Now simply Delete the Key.
5. You have to do this for HK Current user if key is there too.
6. Now go to Run and Type “%temp%”.
7. Delete all files in temporary folder, these are all the files created by software temporary installation and de-installation.
8. Go to C:// Users > Username > App-data ( Check all 3 directories “Local”, “LocalLow”, “Roaming” for your software entry there might be a folder for your software, if you find one Delete that.
9.Now every main step is done you can restart your computer and then Reinstall application. That’s it now you will get your software’s trial period back, well yes steps are long but it’s the manual way you can bypass the trial period of your software and you can perform this everytime your software expires.
 

Monday 7 October 2013

Android Secret codes

 

 1. Phone Information, Usage andBattery – *#*#4636#*#*

2. IMEI Number – *#06#...

3. Enter Service Menu On NewerPhones – *#0*#

4. Detailed Camera Information –*#*#34971539#*#*

5. Backup All Media Files –*#*#273282*255*663282*#*#*

6. Wireless LAN Test –*#*#232339#*#*

7. Enable Test Mode for Service –*#*#197328640#*#*

8. Back-light Test – *#*#0842#*#*

9. Test the Touchscreen –*#*#2664#*#*

10. Vibration Test – *#*#0842#*#*

11. FTA Software Version –*#*#1111#*#*

12. Complete Software andHardware Info – *#12580*369#

13. Diagnostic Configuration –*#9090#

14. USB Logging Control –*#872564#

15. System Dump Mode – *#9900#

16. HSDPA/HSUPA Control Menu –*#301279#

17. View Phone Lock Status –*#7465625#

18. Reset the Data Partition toFactory State – *#*#7780#*#*

Wednesday 2 October 2013

Removing write-protection using Diskpart



With your USB drive plugged in, launch a command prompt. Do this by searching for cmd.exe in the Start menu (or Start screen in Windows 8). In Windows XP, click Start then Run, and type cmd.exe in the box.

NOTE: you may need to run Cmd.exe with administrator privileges if you see an “access is denied” message.

To do that, right-click on the shortcut and choose Run as administrator. In Windows 8, simply choose Command prompt (admin).

Now, type the following, pressing Enter after each command:

diskpart

list disk

select disk x (where x is the number of your USB flash drive – use the capacity to work out which one it is)

attributes disk clear readonly

clean

create partition primary

format fs=fat32  (you can swap fat32 for ntfs if you only need to use the drive with Windows computers)

exit

Remove write protection of your drive using regedit



In any version of Windows from XP onwards, run Regedit.exe (searching regedit will usually show the program at the top of the list).
Navigate to the following key:
Computer\HKEY_LOCAL_MACHINE\SYSTEM\
CurrentControlSet\Control\StorageDevicePolicies

Double-click on the WriteProtect value in the right-hand pane of Regedit.exe. Change the Value data from 1 to 0 and click OK to save the change. Close Regedit and restart your computer. Connect your USB drive again, and you should find it is no longer write protected. You can now format the drive as normal by right-clicking on it in My Computer and choosing Format.
If you can’t find StorageDevicePolicies, you can try creating a key by right-clicking in the white space in the Control folder and choosing New -> Key and carefully entering the name.

Now double-click on the new key (folder) and right-click once again and choose New -> DWORD. Name it WriteProtect and set its value to 0. Click OK, exit Regedit and reboot your computer.

Android Kitkat Upgrade for Galaxy hansets.

 
The Galaxy handsets on the list are said to be getting the update to KitKat 4.4 are:
1. Galaxy Grand and Grand DUOS...
2. Galaxy Ace II
3. Galaxy S III mini
4. Galaxy Beam
5. Galaxy Express
6. Galaxy S Advance
7. Galaxy S II and S II Plus
8. Galaxy Premier
9. Galaxy Note I
10. Galaxy Young and Young DUOS
11. Galaxy Fame
12. Galaxy X Cover 2
13. Selected Galaxy Tabs
 
Some Galaxy devices are meant to get Android 4.4 KitKat straight away:
1. Galaxy Note III
2. Galaxy S IV and other variants
3. Galaxy Note 8.0 and other variants
4. Upcoming Galaxy Note 10.1 and 12.2
5. Galaxy S IV mini Android 4.4 KitKat Features on Samsung Galaxy devices:
- Better processor support on Exynos chipset
- Wider network coverage and better compatibility
- Enhances screen orientation responsiveness
- Additional cloud storage with Android’s exclusive
 
Cloud system
- More Samsung accessories compatible
- Speeds up the RAM and overall performance
- More battery juice on your device.

Sunday 29 September 2013

Code Programmer


 
Computer programming requires a code of ethics , and most of the code of conduct is adapted based on the code of ethics that is now used by a bevy of international programmers .
 
Ethical code a programmer is as follows :
 
1 . A programmer should not make or distribute malware .
 
2 . A programmer should not write code that is hard to follow with purpose.
 
3 . A programmer should not write documentation for deliberately confusing or inaccurate .
 
4 . A programmer should not use this code reset by copyright unless it has purchased or been asked for permission .
 
5 . Should not seek additional benefit of a project funded by the second party without permission . Professional ethics applicable to the programmer in Indonesia 36 . Should not steal software development tools in particular .
 
7 . Should not receive additional funding from various external parties in a project simultaneously unless getting permission .
 
8 . Should not write code that deliberately dropped another programmer's code to take advantage in raising the status .
 
9 . Should not disclose sensitive data of employees in the company .
 
10 . Not to be informed on the financial problems in the development of a project worker .
 
11 . Never take advantage of other people's work .
 
12 . Should not embarrass their profession .
 
13 . Should not carelessly deny the existence of a bug in the application .
 
14 . Should not introduce bugs in the software which eventually will benefit the programmer to fix bugs .
 
15 . Continue to follow the development of computer science . In general , the programmer must adhere to the " Golden Rule " : Treat others as you want to be treated . If all programmers adhere to this rule , there would be no problem in the community .

Friday 27 September 2013

Why Using Multiple Antivirus Programs is a Bad Idea


 1.They will try to kill each other. Because antivirus programs search your system for programs that are monitoring and sending information about your system, a competing antivirus program that is monitoring and sending information about your system tends to look like a virus, so it will attempt to block it and remove it.
2. They will fight over viruses. When an antivirus program encounters a virus, it removes it and quarantines it. But if a competing antivirus program sees that quarantined file and wants to remove and quarantine it in accordance with its own objectives, then it will repeatedly send reports and notifications about this virus that it is detecting, even though it is no longer actually a threat to your system. If you don’t want to continually get bogus warning messages, this will be a problem for you.
3. They will sap your power. Antivirus programs use a lot of your system memory to conduct system scans and other related operations. If you have two of these operating simultaneously,your system’s effectiveness can be greatly diminished or completely wiped out altogether, and without any benefit, since the two are performing redundant operations.

Saturday 21 September 2013

Best Hacking Operating Systems


1. kali Linux
2. BackTrack 5r3
3. NodeZero.
4. BackBox Linux...
5. Blackbuntu.
6. Samurai Web Testing Framework.
7. Knoppix STD.
8. Pentoo.
9. WEAKERTH4N.
10. Matriux Krypton.
11. DEFT.
12. CAINE
13. Bugtraq

Wednesday 18 September 2013

How to Install Backtrack OS in Android Device



1. Rooted android device Linux installer (Can be found on Google play)...
2. Zarchiver (Can be found on Google play)
3. Busybox (Can be found on Google play)
4. Android-VNC (Can be found on Google play)
5. Terminal Emulator (Can be found on Google play)

All of the programs mentioned above are free.
The first thing you need to do is install Busybox
from Google play: Install it, then open it when it's
done, it will install some more things.
When it's done, install Linux Installer from Google
Play: Open Linux installer, then click on Install
Guides from the list on your right hand side: When you click that, you'll see a list of Linux distros, click on Backtrack and you will see a screen with steps on how to install it. Now click on the second page of those steps, you will get a page that looks like this: Just click on "Download Image", and let it finish downloading. While it's downloading, open Google play and install Terminal Emulator, and Zarchiver. Terminal Emulator: Zarchiver: When it finishes downloading, open Zarchiver, and look for the ZIP file that you downloaded, and extraxt the image into a root folder called "backtrack", extract the image into an external memory card not the internal one. Once it's done, open Linux Installer again, and click on launch, you'll get a screen that looks like this: If it didn't recognize any distro, click on Setting > Edit then change the file path there to your backtrack image, the .img file that you extracted. When it finally say "backtrack" on the drop down list, click "Start Linux" Terminal Emulator will open, you just have to proceed with the installation steps, ask you for a new password, and some preferences.
When it's done you will get a red "root@localhost
 
~#" like the picture bellow:
You are now in backtrack! Now if you want backtrack in GUI, open Google play, and install Android VNC: Open It when it finishes installing, and it will look like this: Set to the same settings in the picture, but not the IP address, you can get your IP by opening backtrack terminal, in terminal emulator, and running "ifconfig" command: Settings for VNC are, Username: backtrack Password: backtrac IP: from the "ifconfig" command or just put 127.0.0.1 Color Format: 24-bit Now click connect, and boom! You'r in backtrack Desktop!When you finis using it, remember to disconnect VNC AND exit backtrack in Terminal Emulator, else it will be taking your battery in the background. And note that Ubuntu can be installed in the same exact way, just the username and password for VNC will change.

Saturday 14 September 2013

#40 Samsung Mobile Trick.

Note: After dialing this number all the phone memery data will be lost.

Type:- *2767*3855# and press calling button. This will reset your Mobile password to default security code.
Note: After dialing this number all the phone memery data will be lost.

Wednesday 11 September 2013

#39 How to enable God Mode in Windows 7 and Vista

By enabling God mode you can access all your windows setting from one folder and it makes really easy to access and change windows settings. This works in 32bit as well as 64bit operating system. So lets enable God mode on your computer.

1. On your desktop right click and create a New Folder.
2. Rename this folder to the code given below.
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
3. Done now double click on this folder and you will have access to all your windows operating system settings.

Friday 6 September 2013

#38 How to rename a 'Recycle bin' ?

1. Click Start / Run
2. Type regedit and hit enter.
3. Open the HKEY_CLASSES_ROOT folder
4. Open the CLSID folder
5. Open the {645FF040-5081-101B-9F08-00 folder
6. Open the ShellFolder folder
7. Change the "Attributes" data value from "40 01 00 20" to "50 01 00 20". O completed change the "CallForAttributes" dword value to "0x00000000" (double click and change value data to 0). You must change both of these values to get rename to appear.
After performing the above steps you will be able to rename the icon like any con. Right-click the Recycle Bin icon on the desktop and click Rename and rename it to whatever you wish.

#37 Hackers Matrix rain on your computer

@echo off
 color 02
 : start
 echo  %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start

Sunday 1 September 2013

#36 Disable USB port

 1. Windows + r = Run (Goto run)

2. Type 'regedit' without quotes...

3. Click on HKEY_LOCAL_MACHINE

4. goto SYSTEM

5. Click on CurrentControlSet

6. Click on services

7. Goto USBSTOR

8. Double click on 'Start' where value is 3

9. Now change the value data with 4

10. Now press ok and refresh your desktop your USB port is disabled, to enable the usb port replace the value 4 with 3.

Wednesday 28 August 2013

#35 How to use a USB Modem/3G Dongle with any SIM | No Unlocking

 1.) Insert Sim in Modem .
2.) No need of your Modem Software, it will say that it is invalid sim. Ignore that & close it.
3). Start NOKIA PC suite....
4). Go to Nokia pc suite connect to Internet option.
5.)Go to Configure. Select your data card modem, and make all operator apn setting as like when we use Nokia mobile connection Ex: If your SIM is of Docomo then enter Apn as > tata.docomo.internet
6. You're done click on finish.
7. Now connect to internet through PC suite.

Sunday 25 August 2013

#34 How to hide computer account in your computer ?

1. Open Start menu then click on RUN.
 2. Type "Regedit" press enter
 3. Windows Registry editor will open then navigate from the
 left panel and go to:
 HKLM\Software\Microsoft\WindowsNT\CurrentVersion
 \Winlogon\SpecialAccounts\UserList
 4. Create a new DWORD
 5. setting its name to the name of the account you wish to
 hide.
 6. Then set its value to "0" to hide it.
 Now your account is hidden!!!
 This account isn't completely hidden because it is visible to
 administrators in Local User and Groups and also the profile
 is visible in the Documents and Settings.

 To Login after you have hidden the account
 1. At Welcome screen, and you want to login to this account.
 2. Press Ctrl+Alt+Delete twice (Only delete is twice)
 3. It will display the log-on promt.
 3. Type the username, and the password and hit enter.

-Do it on your own risk, probably work in all Windows OS.

Wednesday 14 August 2013

#33 How to Patch Up IDM [Internet Download Manager] (Without any software or anything)

Browse to C:\Windows\System32\Drivers\etc folder, there you will find a file named hosts. Open that file in notepad or wordpad and append it with following lines

 127.0.0.1 tonec.com
 127.0.0.1 www.tonec.com
 127.0.0.1 registeridm.com
 127.0.0.1 www.registeridm.com
 127.0.0.1 secure.registeridm.com
 127.0.0.1 internetdownloadmanager.com
 127.0.0.1 www.internetdownloadmanager.com
 127.0.0.1 secure.internetdownloadmanager.com
 127.0.0.1 mirror.internetdownloadmanager.com
 127.0.0.1 mirror2.internetdownloadmanager.com


If you are unable to edit the hosts file, just copy that host file on to your desktop, and then open it with notepad and then edit it and press "ctrl+s", and now copy the edited host file back to the "/etc".
Restart your system.

After You add them to the host file, save the host file. Now Register with any of the serials below. For the Name , email etc put in anything but when asked to enter serial Number Put in any from Below

 RLDGN-OV9WU-5W589-6VZH1
 HUDWE-UO689-6D27B-YM28M
 UK3DV-E0MNW-MLQYX-GENA1
 398ND-QNAGY-CMMZU-ZPI39
 GZLJY-X50S3-0S20D-NFRF9
 W3J5U-8U66N-D0B9M-54SLM
 EC0Q6-QN7UH-5S3JB-YZMEK
 UVQW0-X54FE-QW35Q-SNZF5
 FJJTJ-J0FLF-QCVBK-A287M


Sunday 11 August 2013

#32 How To Save Your Smart Phone From Battery Killing Applications

5 Tips to Protect Your Smartphone’s Battery

1.Go Easy on Ad-Supported Apps
Most of the applications constantly connect and reload, which is a major hit to your battery life. Not all free apps have ads; and not all paid apps are ad free. But you can count on any ad-supported app to be a major drain on your battery, especially if it’s using location-tracking to personalize the
content.

2.Beware of Apps that Use Too Many Internal Features
Ads are a particular example, but any app that uses a lot of the ‘internals’ of your phone will suck the juice right out of it. As we’ve said, GPS and other location services are a major concern, but it also goes for vibration alerts, WiFi, Bluetooth, and sensors(accelerometer, compass, etc.)

3.Don’t Allow Push Alerts
Email is great, Facebook is great, knowing the minute that there’s an update to your apps is great. Et cetera. After all, staying connected on a second-by-second basis is the reason you never let your smartphone out of your sight. Having said that, your battery might be drained twice as fast if you leave email push, social media, and/or app update notifications turned on.

4.Be Vigilant about Apps Mess with Your Display
Apps and app settings that adjust the brightness and timeout of the screen could be costing you juice. Obviously one of those bright flashlight apps is going to run your battery down, but also keep an eye on things like graphics-intensive games, e-readers, lock screen gadgets.

5.Monitor your Usage
I’ve been telling you all about apps that you should watch out for, but I’ll change course and recommend two essential types of apps that you should have installed: one to monitor your battery: ideally, with enough detail to let you know exactly what kinds of usage is most draining. And one to kill battery-sucking apps that keep running in the background. There area few apps that do both quite well; Android users should take a look at Android Assistant(which, ironically, comes in an ad-sponsored trial version).
Beware of these factors and save your battery life for long period.

Friday 9 August 2013

#31 Internet Error Codes!

 Error 400 - Bad request.
 Error 401 -unauthorized request.
 Error 403 - forbidden.
 Error 404 - Not found.
 Error 500 -Internal error.
 Error 501 - Not Implemented
 Error 502 - Bad Gateway
 Error 503 -Service unavailable.
 Error 504 - Gateway Time-Out
 Error 505 - HTTP Version not supported/DNS Lookup Fail/ unknw host
 Error 500-599 - Server Errors........!

Tuesday 6 August 2013

#30 How to use Google to find serial key of any Software

 1) www.google.com
 2) Type the name of Software you want to crack or serial key
 3) Give space and type 94fbr

For example (quickheal 94fbr)

Saturday 3 August 2013

#29 Read out.. !

GOOGLE :- Global Organization Of Oriented Group Language of Earth
APPLE:- Asian Passenger Payload Experiment
HP :- Hewlett-Packard
IBM:- International Business Machines Corporation
HCL:-Hindustan Computer Limited
WIPRO:- Western India Product Limited
GE:-General Electronics
INFOSYS:-Information System
TCS:- Tata Consultancy Services
AOL:- American Online
BPL:- British Process Laboratory
INTEL:- Integrated Electronics
CISCO:- Computer Information System Company
DELL:- Michael DELL
SONY:-Sound Of New York
AMD:- Advance micro devices
LENOVO:- LE(Legend),NOVO(New)
COMPAQ:- Compatibility And Quality
LG:- Life's Good

#28 Inventors of Computer Hardware

 1. Key board — Herman Hollerith, first keypunch device in 1930’s
 2. Transistor — John Bardeen, Walter Brattain & Wiliam Shockley (1947 - 1948)
 3. RAM — An Wang and Jay Forrester (1951)
 4. Trackball — Tom Cranston and Fred Longstaff (1952)
 5. Hard Disk — IBM , The IBM Model 350 Disk File (1956 )
 6. Integrated Circuit— Jack Kilby & Robert Noyce (1958)
 7. Computer Mouse — Douglas Engelbart (1964)
 8. Laser printer— Gary Stark weather at XEROX in 1969.
 9. Floppy Disk— Alan Shugart & IBM( 1970)
 10. Microprocessor — Faggin, Hoff & Mazor – Intel 4004

Thursday 1 August 2013

#27 How to fix Memory Card formatting problem ?

Some times our Memory Cards stop working after we have formatted them from our Computer and not from mobile. If you read user manual of your Mobile you will find a warning message asking you not to format phone memory of your mobile and memory card from computer, you should use mobile.

Memory Card use FAT16(FAT) file system and through your computer you can format it into only FAT32 and NTFS file system and if you format it with any of these two file system then your memory card will stop working in your mobile phone.

The solution of this problem is to format the Memory Card again with FAT(FAT16) file system through computer because your mobile cant read it any more so you cannot format it from your Mobile.

To fix this issue follow the steps given below.

To format your Memory Card with FAT (FAT16) file system, follow the steps given below:

1. Plug-in your Memory Card into your computer.
2. Wait till computer detects the Memory Card.
3. Now note down the Drive Letter of your Memory Card.

--In this tutorial we will assume that drive letter of your Memory Card is H: but you should replace it with actual drive letter of your memory card.

4. Now run Command Prompt by Typing CMD and hitting Enter in Start>>Run or by typing CMD and hitting Enter key after pressing WinKEY+R.
Windows 7 and Vista users should type CMD in Start’s Search Box when Command Prompt appear, right click on it and run as administrator.
5. Once Command Prompt launches, Type H: /fs:FAT and hit enter.

Please note that in above tutorial we assumed that H: is drive letter of memory card but this could not be same in your case so make sure to replace H: with actual drive letter of your Memory Card.
Also Please note that if you format, your data will be erased.

That’s it.
Once your Memory Card is formatted, You can start using it your Mobile.

Wednesday 31 July 2013

#26 Different Types of Web Vulnerabilities

[x] PHP code injection
[x] PHP curl_exec() url is controlled by user
[x] PHP invalid data type error message
[x] PHP preg_replace used on user input
[x] PHP unserialize() used on user input
[x] Arbitrary File Deletion
[x] Code Execution Hacking(LFI,RFI,Iframe Injection, Remote Code Execution)
[x] Cookie Manipulation (Meta HTTP-EQUIV & CRLF Injection)
[x] CRLF Injection (HTTP response splitting & Headers Injection)
[x] Cross Frame Scripting ( XFS )
[x] Cross-Site Scripting ( XSS - Persistent, Non-Persistent, DOM Based)
[x] Directory traversal including shell uploading
[x] Microsoft Office possible sensitive information
[x] Possible internal IP address disclosure
[x] Possible server path disclosure (Unix and Windows)
[x] Possible username or password disclosure
[x] Sensitive data not encrypted
[x] Source code disclosure
[x] Cross-Site Request Forgery (CSRF)
[x] Email Injection
[x] File Inclusion (LFI,RFI with and without null byte)
[x] Full Path Disclosure
[x] LDAP Injection
[x] Remote XSL inclusion
[x] Script source code disclosure
[x] Server-Side Includes (SSI) Injection
[x] Structured Query Language Injection(SQL Injection)
[x] URL Redirection
[x] XPath Injection vulnerability
[x] EXIF
[x] Buffer Overflows
[x] Clickjacking
[x] Dangling Pointers
[x] Format String Attack
[x] FTP Bounce Attack
[x] Symlinking and Server Rooting
[x] Blind SQL injection (timing - Boolean Based)
[x] Blind SQL Injection (Blind SQL String Based and Double Query Blind Based)
[x] 8.3 DOS Filename Source Code Disclosure
[x] Search for Backup files
[x] Cross Site Scripting in URI
[x] PHP super-globals-overwrite
[x] Script errors (such as the Microsoft IIS Cookie Variable Information Disclosure)
[x] WebDAV (very vulnerable component of IIS servers)
[x] Application error message
[x] Check for common files
[x] Directory Listing
[x] Email address found
[x] Local path disclosure
[x] Possible sensitive files

#25 Difference between http and https in URLs

The addresses that begin with "HTTP," stands for "Hyper Text Transfer Protocol." Whereas "HTTPS" stands for "Hyper Text Transfer Protocol Secure" which means that information exchanged between user and a web site is encrypted and cannot be hacked by someone who might want to electronically cheat when you type a credit card number, a password, a social security number, or any other confidential information.

#24 How to Unlock/Reset a Android Lock in Emergency?

1) First of all, you need to Switch off your android device and keep it for some time.
2) Now press the up volume button and hold it for 30 seconds.
3) Now press home button and hold it, Then press power button and after started your phone just release it.
4) Then you can see enter secret android menu you never see it before, just click on home button up and down in the menu.
5) Now click on third option which is Delete All User Data.
6) Now in this way, your android lock pattern is unlocked now problem is solved.


Note: Works only to most of the mobiles but not all.

#23 - 4 Ways to get Faster Boot Up Times

Step 1: Hard Disk Check Up

 Over time, your hard drives gets degraded both physically and digitally.
 It’s important to monitor your drives health. An error or damaged sector can throw software loading into an infinite loop causing long load times. To check your drive health:
 1. Click Start
 2. Choose Computer
 3. Right Click your Hard Drive
 4. Choose Properties
 5. Click Check Drives Health. After, the check up gives you repair options or a clean bill of health.
 6. Restart to get a faster boot up.

Step 2: Eliminate Startup Delay

 To get faster boot up speeds, you can cut the boot delay to 0. The delay is in place to allow your startup processes some breathing room during loading. Your default delay is 30 seconds. So, you can eliminate it for faster boot up times.
 1. Open your Start menu.
 2. Click Run
 3. In the command screen, type msconfig
 4. In the system configuration utility, click either BOOT tab.
 5. In the boot menu, change the default setting for the Time Out from 30 to 5 seconds.

Step 3: Organize your Hard Drive

 If you are looking for something in a messy room, naturally, it’s going to take you longer to find something. This is a good metaphor for a hard drive. Over time, filing system gets disorganized. Periodically, you need to reorganize this filing system on your hard drive. Luckily, Windows has a good utility called Defrag that will put your system in order.
 1.Open the Start Menu
 2. Click on My Computer
 3. Right Click your C: drive or your
 hard drive image.
 4. Scroll down to the Click Properties
 5. In the Properties Menus, Open
 the “Tools” menu.
 6. Choose Defragment.
 7. In the Disk Deframenter menu. Click on Defragment

Step 4: Remove Excess Startup

Programs, Most programs you add to your computer will opt to load when you startup your computer. Eventually you will rack up a load of programs that kill faster boot times. You need to reduce the startup programs. You can easily disable unnecessary startup programs. Here is how:
 1. Open your Start menu.
 2. Click Run
 3. Type msconfig, click Enter
 4. In the system configuration utility, click either services or startup tab.
 5. Uncheck all programs that your are no longer want to run in the background.

Monday 29 July 2013

#22 Google does not consider the dots (.)

If we use dots in the mail address it will not consider. 

Its quite surprising and interesting. We have been using gmail since years.But you may not notice this feature.
It doesn't "recognize dots (.) in username". At gmail Log in page you can enter any number of dots in username. gmail ignores it as such.

 For example if your usenrname is xyz@gmail.com then,if you enter
 x.y.z@gmail.com
 x.....y.z@gmail.com
 xyz...@gmail.com
 or any number of dots , with same password it'll log in successfully.

 Try it.

Sunday 28 July 2013

#21 Know your Internet browser shortcuts

There are dozens of different shortcut keys that can be used with Internet browsers. Below are a few of our top suggested Internet browser shortcuts.

- Pressing Alt + D in any major Internet browser will move the cursor into the address bar. This is a great way to quickly enter an Internet address without having to click the mouse cursor in the address bar.
- Hold down the Ctrl key and press the + or - to increase and decrease the size of text.
- Press the backspace key or hold down the Alt key + left arrow to go back a page.
- Press F5 to refresh or reload a web page.
- Press F11 to make the Internet browser screen full screen. Press F11 again to return back to the normal view.
- Press Ctrl + B to open your Internet bookmarks.
- Press Ctrl + F to open the find box in the browser to search for text within the web page you're looking at.

Saturday 27 July 2013

#20 How To Encrypt and Send Password Protected Email In Gmail ?

 (1 ) Install "Secure Gmail" add on from chrome.
 (2) Now to send password protected encrypted email login n click the lock icon next to 'Compose' button.
 (3) Now type in the email and all, and click 'Send Encrypt'.
 (4) Then Type the Password, and the hint if u want. And click 'Encrypt & Send'. And tell the recipient the password.
 You're Done.

 The recipient will receive an encrypted email and it'll be demanded for password 2 decrypt it.
 Now you no need to bother if anyone hacks the accounts and look into your personal messages.

#19 Emails sent each second

Approximately 3.4 million emails are sent each second, that's 294 billion every day.
78% of emails are spam.

Friday 26 July 2013

#18 Android Hidden Codes

 *#06# – IMEI number
 *#0*# – Enter the service menu on newer phones like Galaxy S III
 *#*#4636#*#* – Phone information, usage statistics and battery
 *#*#34971539#*#* – Detailed camera information
 *#*#273282*255*663282*#*#* – Immediate backup of all media files
 *#*#197328640#*#* – Enable test mode for service
 *#*#232339#*#* – Wireless LAN tests
 *#*#0842#*#* – Backlight/vibration test
 *#*#2664#*#* – Test the touchscreen
 *#*#1111#*#* – FTA software version (1234 in the same code will give PDA and firmware version)
 *#12580*369# – Software and hardware info
 *#9090# – Diagnostic configuration
 *#872564# – USB logging control
 *#9900# – System dump mode
 *#301279# – HSDPA/HSUPA Control Menu
 *#7465625# – View phone lock status
 *#*#7780#*#* – Reset the /data partition to factory state
 *2767*3855# – Format device to factory state (will delete everything on phone)
 ##7764726 – Hidden service menu for Motorola Droid

Thursday 25 July 2013

#17 Security tips for Safe Online Banking

 1.Access your bank website only by typing the URL in the address bar of your browser.
 2.Do not click on any links in any e-mail message to access the site.
 3.State Bank never sends e-mail and embedded links asking you to update or verify personal, confidential and security details. NEVER RESPOND to such e-mails/phone calls/SMS if you receive.
 4.Do not be lured if you receive any-mail/SMS/phone call promising reward for providing your personal information or for updating your account details in the bank site.
 5.Having the following will improve your internet security:
 6.Newer version of Operating System with latest security patches.
 *Latest version of Browsers (IE 7.0 and above , Mozilla Firefox 3.1 and above, Opera 9.5 and above, Safari 3.5 and above, Google chrome,etc.)
 *Firewall is enabled.
 *Antivirus signatures applied
 5.Scan your computer regularly with Antivirus to ensure that the system is Virus/Trojan free.
 6.Change your Internet Banking password at periodical intervals.
 7.Always check the last log-in date and time in the post log in page.
 8.Avoid accessing Internet banking accounts from cyber cafes or shared PCs.

Monday 22 July 2013

#16 Full form of computer related terms

 * HTTP - Hyper Text Transfer Protocol.
 * HTTPS - Hyper Text Transfer Protocol Secure.
 * IP - Internet Protocol.
 * URL - Uniform Resource Locator.
 * USB - Universal Serial Bus.
 * VIRUS - Vital Information Resource Under Seized.
 * 3G - 3rd Generation.
 * GSM - Global System for Mobile Communication.
 * CDMA - Code Division Multiple Access.
 * UMTS - Universal Mobile Telecommunication System.
 * SIM - Subscriber Identity Module.
 * AVI = Audio Video Interleave
 * RTS = Real Time Streaming
 * SIS = Symbian OS Installer File
 * AMR = Adaptive Multi-Rate Codec
 * JAD = Java Application Descriptor
 * JAR = Java Archive
 * JAD = Java Application Descriptor
 * 3GPP = 3rd Generation Partnership Project
 * 3GP = 3rd Generation Project
 * MP3 = MPEG player lll
 * MP4 = MPEG-4 video file
 * AAC = Advanced Audio Coding
 * GIF = Graphic Interchangeable Format
 * JPEG = Joint Photographic Expert Group
 * BMP = Bitmap
 * SWF = Shock Wave Flash
 * WMV = Windows Media Video
 * WMA = Windows Media Audio
 * WAV = Waveform Audio
 * PNG = Portable Network Graphics
 * DOC = Document (Microsoft Corporation)
 * PDF = Portable Document Format
 * M3G = Mobile 3D Graphics
 * M4A = MPEG-4 Audio File
 * NTH = Nokia Theme (series 40)
 * THM = Themes (Sony Ericsson)
 * MMF = Synthetic Music Mobile Application File
 * NRT = Nokia Ringtone
 * XMF = Extensible Music File
 * WBMP = Wireless Bitmap Image
 * DVX = DivX Video
 * HTML = Hyper Text Markup Language
 * WML = Wireless Markup Language
 * CD - Compact Disk.
 * DVD - Digital Versatile Disk.
 * CRT - Cathode Ray Tube.
 * DAT - Digital Audio Tape.
 * DOS - Disk Operating System.
 * GUI - Graphical User Interface.
 * HTTP - Hyper Text Transfer Protocol.
 * IP - Internet Protocol.
 * ISP - Internet Service Provider.
 * TCP - Transmission Control Protocol.
 * UPS - Uninterruptible Power Supply.
 * HSDPA - High Speed Downlink Packet Access.
 * EDGE - Enhanced Data Rate for GSM [Global System for Mobile Communication Evolution].
 * VHF - Very High Frequency.
 * UHF - Ultra High Frequency.
 * GPRS - General Packet Radio Service.
 * WAP - Wireless Application Protocol.
 * TCP - Transmission Control Protocol .
 * ARPANET - Advanced Research Project Agency Network.
 * IBM - International Business Machines.
 * HP - Hewlett Packard.
 * AM/FM - Amplitude/ Frequency Modulation.
 * WLAN - Wireless Local Area Network

Saturday 20 July 2013

#15 Create a shortcut key for Internet web pages

  1. Create a new shortcut on your Desktop or anyplace you want the shortcut to appear.
  2. For the location of the item, enter the full web address. For example, Google would be: http://www.google.com/
  3. Enter the name of the Shortcut and click Ok. 
  4. The new shortcut is now created and can be assigned a shortcut by right-clicking the shortcut and clicking Properties. In the shortcut properties window, assign a new shortcut key and click OK. 
  5. Now when the shortcut key is pressed the web page will be automatically loaded.

Friday 19 July 2013

#14 Use a picture password to log into your computer

Windows 8 includes a new feature called Picture password, which allows you to authenticate with the computer using a series of gestures that include circles, straight lines, and taps. Enable this feature if you want a new way to access your computer or have a hard time with passwords.

  1. Open the Windows Charms.
  2. Click Settings and then More PC settings
  3. In the PC settings window click Users and then select Create a picture password

Bonus tip: A four digit pin password can also be created and used to access your computer.

Thursday 18 July 2013

#13 List Of Full Form of Domain Names Extensions

.com → commercial Internet sites.
.edu → educational sites .
.firm → for an Internet site for a business.

.gov → for a government site on the Internet.
.int → international institutions.
.mil → for a U.S. military site on the Internet.
.mobi → for mobile phones.
.nato → for NATO sites.
.net → for Internet administrative sites.
.nom → for a personal site on the Internet.
.org → for organizational Internet sites.
.store →for a retail business.
.web → for an Internet site that is about the World Wide Web.
.in → India
.Us → united states
.uk -> united kindom

Wednesday 20 February 2013

#12 How to use the keyboard as a mouse?

 To activate this just press
 Alt+Left shift key+num lock
 now you can access your keyboard as a mouse.
 navigation keys for keyboard
 5-select
 2-move down
 8-move up
 4-move left
 6-move right
 for double click,just press the plus symbol(+)
 for right click,just press the minus symbol (-)
 to deactivate just press same key (i.e., Alt+Left shift key+num lock)
 You're done.

Saturday 16 February 2013

#11 All Shortcut Keys of Windows 8

Some of the shortcut keys are used on Start screen and some other keys are used in desktop.
 
Ctrl+plus (+) or Ctrl+minus (-)  - Zoom in or out of apps pinned to the Start screen
Ctrl+scroll wheel  - Zoom in or out of apps pinned to the Start screen
Windows logo key+C - Open the Charms
Windows logo key+C  - Open the commands for the app
Windows logo key+F - Open the Search charm to search files
Windows logo key+H  - Open the Share charm
Windows logo key+I - Open the Settings charm
Windows logo key+J - Switch the main app and snapped app
Windows logo key+K - Open the Devices charm
Windows logo key+O  - Lock the device orientation
Windows logo key+Q  - Open the Search charm to search apps
Windows logo key+V  - Cycle through notifications
Windows logo key+Shift+V  - Cycle through notifications in reverse order
Windows logo key+W  - Open the Search charm to search settings
Windows logo key+,  - Temporarily peek at the desktop
Windows logo key+Z  - Show the commands available in the app
Windows logo key+spacebar  - Switch input language and keyboard layout
Windows logo key+Ctrl+spacebar  - Change to a previously selected input
Windows logo key+Tab  - Cycle through open apps (except desktop apps)

Windows logo key+Ctrl+Tab  - Cycle through open apps (except desktop apps) and snaps them as they are cycled

Windows logo key+Shift+Tab  - Cycle through open apps (except desktop apps) in reverse order

Windows logo key+PgUp  - Move the Start screen and apps to the monitor on the left (Apps in the desktop won’t change monitors)

Windows logo key+PgDown  - Move the Start screen and apps to the monitor on the right (Apps in the desktop won’t change monitors)

Windows logo key+Shift+period (.)  - Snaps an app to the left
Windows logo key+period (.)  - Snaps an app to the right



General Key Board Shortcuts

F1  - Display Help
F2  - Rename the selected item
F3  - Search for a file or folder
F4  - Display the address bar list in Windows Explorer
F5  - Refresh the active window
F6  - Cycle through screen elements in a window or on the desktop
F10  - Activate the menu bar in the active app
Alt+F4  - Close the active item, or exit the active app
Alt+Esc  - Cycle through items in the order in which they were opened
Alt+underlined letter  - Perform the command for that letter
Alt+Enter  - Display properties for the selected item
Alt+spacebar  - Open the shortcut menu for the active window
Alt+left arrow  - Back
Alt+right arrow  - Forward
Alt+Page Up  - Move up one screen
Alt+Page Down  - Move down one screen
Alt+Tab  - Switch between open apps (except desktop apps)

Ctrl+F4  - Close the active document (in apps that allow you to have multiple documents open simultaneously)

Ctrl+A  - Select all items in a document or window
Ctrl+C (or Ctrl+Insert)  - Copy the selected item
Ctrl+R (or F5)  - Refresh the active window
Ctrl+V (or Shift+Insert)  - Paste the selected item
Ctrl+X  - Cut the selected item
Ctrl+Z  - Undo an action
Ctrl+Y  - Redo an action
Ctrl+plus (+) or Ctrl+minus (-)  - Zoom in or out of apps pinned to the Start screen
Ctrl+scroll wheel  - Zoom in or out of apps pinned to the Start screen
Ctrl+ mouse scroll wheel  - Change the size of desktop icons
Ctrl+right arrow  - Move the cursor to the beginning of the next word
Ctrl+left arrow  - Move the cursor to the beginning of the previous word
Ctrl+down arrow  - Move the cursor to the beginning of the next paragraph
Ctrl+up arrow  - Move the cursor to the beginning of the previous paragraph
Ctrl+Alt+Tab  - Use the arrow keys to switch between all open apps
Ctrl with an arrow key+spacebar  - Select multiple individual items in a window or on the desktop
Ctrl+Shift with an arrow key  - Select a block of text
Ctrl+Esc  - Open the Start screen
Ctrl+Shift+Esc  - Open Task Manager
Ctrl+Shift  - Switch the keyboard layout when multiple keyboard layouts are enabled
Shift+F10  - Display the shortcut menu for the selected item

Shift with any arrow key  - Select more than one item in a window or on the desktop, or select text within a document

Shift+Delete  - Delete the selected item without moving it to the Recycle Bin first
Right arrow  - Open the next menu to the right, or open a submenu
Left arrow  - Open the next menu to the left, or close a submenu
Esc  - Cancel the current task



Dialog Box Shortcut Keys

F1  - Display Help
F4  - Display the items in the active list
Ctrl+Tab  - Move forward through tabs
Ctrl+Shift+Tab  - Move back through tabs
Ctrl+N (Number 1-9)  - Move to Nth tab
Tab  - Move forward through options
Shift+Tab  - Move back through options
Alt+underlined letter  - Perform the command or select the option for that letter
Enter  - Replace clicking the mouse for many selected commands
Spacebar  - Select or clear the check box if the active option is a check box
Backspace  - Open a folder one level up if a folder is selected in the Save As or Opendialog box
Arrow keys  - Select a button if the active option is a group of option buttons



Windows logo Key Shortcut Keys

Windows logo key+F1  - Open Windows Help and Support
Windows logo key  - Display or hide the Start menu
Windows logo key+B  - Set focus in the notification area
Windows logo key+C  - Open the Charms
Windows logo key+C  - Open the commands for the app
Windows logo key+D  - Display and hides the desktop
Windows logo key+E  - Open Computer
Windows logo key+F  - Open the Search charm and search file
Windows logo key+G  - Cycle through gadgets on the desktop
Windows logo key+H  - Open the Share charm
Windows logo key+I  - Open the Settings charm
Windows logo key+J  - Switch the main app and snapped app
Windows logo key+K  - Open the Devices charm
Windows logo key+L  - Lock your PC or switch users
Windows logo key+M  - Minimize all windows
Windows logo key+O  - Lock device orientation
Windows logo key+P  - Choose a presentation display mode
Windows logo key+Q  - Open the Search charm and search apps
Windows logo key+R  - Open the Run dialog box
Windows logo key+T  - Cycle through apps on the taskbar
Windows logo key+U  - Open Ease of Access Center
Windows logo key+V  - Cycle through notifications
Windows logo key+Shift+V  - Cycle through notifications in reverse order
Windows logo key+W  - Open the Search charm and search settings
Windows logo key+X  - Opens the Quick Link menu
Windows logo key+,  - Temporarily peek at the desktop
Windows logo key+Z  - Show the commands available in the app
Windows logo key+Pause  - Display the System Properties dialog box
Windows logo key+Ctrl+F  - Search for PCs (if you’re on a network)
Windows logo key+Shift+M  - Restore minimized windows on the desktop

Windows logo key+number  - Start the desktop app pinned to the taskbar in the position indicated by the number. If the app is already running, switch to that app.

Windows logo key+Shift+number  - Start a new instance of the desktop app pinned to the taskbar in the position indicated by the number

Windows logo key+Ctrl+number  - Switch to the last active window of the desktop app pinned to the taskbar in the position indicated by the number

Windows logo key+Alt+number  - Open the Jump List for the desktop app pinned to the taskbar in the position indicated by the number

Windows logo key+Ctrl+Shift+number  - Open a new instance of the desktop app located at the given position on the taskbar as admin

Windows logo key+Tab  - Cycle through open apps (except desktop apps)

Windows logo key+Ctrl+Tab  - Cycle through open apps (except desktop apps) and snaps them as they are cycled

Windows logo key+Ctrl+B  - Switch to the app that displayed a message in the notification area
Windows logo key+up arrow  - Maximize the desktop window
Windows logo key+down arrow  - Minimize the desktop window
Windows logo key+left arrow  - Maximize the desktop window to the left side of the screen
Windows logo key+right arrow  - Maximize the desktop window to the right side of the screen

Windows logo key+Home  - Minimize all but the active desktop window (restores all windows on second stroke)

Windows logo key+Shift+up arrow  - Stretch the desktop window to the top and bottom of the screen

Windows logo key+Shift+down arrow  - Restore/minimize active desktop windows vertically, maintaining width

Windows logo key+Shift+left arrow or right arrow  - Move a window in the desktop from one monitor to another

Windows logo key+spacebar  - Switch input language and keyboard layout
Windows logo key+Ctrl+spacebar  - Change to a previously selected input
Windows logo key+Enter  - Open Narrator

Windows logo key+PgUp  - Move the Start screen and apps to the monitor on the left (Apps in the desktop won’t change monitors)

Windows logo key+PgDown  - Move the Start screen and apps to the monitor on the right (Apps in the desktop won’t change monitors)

Windows logo key+Shift+period (.)  - Snaps an app to the left
Windows logo key+period (.)  - Snaps an app to the right
Windows logo key+Tab  - Cycle through opens apps (except desktop apps)

Windows logo key+Shift+Tab  - Cycle through opens apps (except desktop apps) in reverse order

Windows logo key+Ctrl+Tab  - Cycle through opens apps (except desktop apps) and snaps them as they are cycled

Windows logo key+/  - Initiate IME reconversion
Windows logo key+Alt+Enter  - Opens Windows Media Center
Windows logo key+plus (+) or minus (-)  - Zoom in or out (in Magnifier)
Windows logo key+Esc  - Exit Magnifier



File Explorer Shortcut Keys

Alt+D  - Select the address bar
Ctrl+E  - Select the search box
Ctrl+F  - Select the search box
Ctrl+N  - Open a new window
Ctrl+W  - Close the current window
Ctrl+mouse scroll wheel  - Change the size and appearance of file and folder icons
Ctrl+Shift+E  - Display all folders above the selected folder
Ctrl+Shift+N  - Create a new folder
Num Lock+Asterisk (*)  - Display all subfolders under the selected folder
Num Lock+plus (+)  - Display the contents of the selected folder
Num Lock+minus (-)  - Collapse the selected folder
Alt+P  - Display the preview pane
Alt+Enter  - Open the Properties dialog box for the selected item
Alt+right arrow  - View the next folder
Alt+up arrow  - View the parent folder
Alt+left arrow  - View the previous folder
Backspace  - View the previous folder
Right arrow  - Display the current selection (if it’s collapsed), or select the first subfolder
Left arrow  - Collapse the current selection (if it’s expanded), or select the parent folder
End  - Display the bottom of the active window
Home  - Display the top of the active window
F11  - Maximize or minimize the active window



Taskbar Shortcut Keys

Shift+click on a taskbar button  - Open a app or quickly open another instance of a app
Ctrl+Shift+click on a taskbar button  - Open a app as an administrator
Shift+Right-click on a taskbar button  - Show the window menu for the app
Shift+Right-click on a grouped taskbar button  - Show the window menu for the group
Ctrl+Click on a grouped taskbar button  - Cycle through the windows of the group



Ease of Access Shortcut Keys

Right Shift for eight seconds  - Turn Filter Keys on and off
Left Alt+Left Shift+PrtScn  - Turn High Contrast on or off
Left Alt+Left Shift+Num Lock  - Turn Mouse Keys on or off
Shift five times  - Turn Sticky Keys on or off
Num Lock for five seconds  - Turn Toggle Keys on or off
Windows logo key+U  - Open the Ease of Access Center



Magnifier Shortcut Keys

Windows logo key+plus (+) or minus (-)  - Zoom in or out
Ctrl+Alt+spacebar  - Preview the desktop in full-screen mode
Ctrl+Alt+D  - Switch to docked mode
Ctrl+Alt+F  - Switch to full-screen mode
Ctrl+Alt+I  - Invert colors
Ctrl+Alt+L  - Switch to lens mode
Ctrl+Alt+R  - Resize the lens
Ctrl+Alt+arrow keys  - Pan in the direction of the arrow keys
Windows logo key+Esc  - Exit Magnifier



Narrator Shortcut Keys

Space or Enter  - Activate current item
Tab and arrow keys  - Move around on the screen
Ctrl  - Stop reading
Caps Lock+D  - Read item
Caps Lock+M  - Start reading
Caps Lock+H  - Read document
Caps Lock+V  - Repeat phrase
Caps Lock+W  - Read window
Caps Lock+Page Up/Down  - Increase or decrease the volume of the voice
Caps Lock+plus (+) or minus (-)  - Increase or decrease the speed of the voice
Caps Lock+spacebar  - Do default action
Caps Lock+left or right arrows  - Move to previous/next item
Caps Lock+F2  - Show commands for current item
Press Caps Lock twice in quick succession  - Turn Caps Lock on or off
Caps Lock + Esc  - Exit Narrator


Narrator touch Shortcut Keys

Tap once with two fingers  - Stop Narrator from reading
Tap three times with four fingers  - Show all Narrator commands (including the ones not in this list)
Double-tap  - Activate primary action
Triple-tap  - Activate secondary action
Touch or drag a single finger  - Read what’s under your finger
Flick left/right with one finger  - Move to next or previous item
Swipe left/right/up/down with two fingers  - Scroll
Swipe down with three fingers  - Start reading on explorable text

Friday 15 February 2013

#10 LIST of Operating System (OS)


 2K
 86-DOS
 A/UX
 Acados
 ACP (Airline Control Program)
 AdaOS
 ADMIRAL
 Adrenaline
 aerolitheOS
 Aimos
 AIOS
 AIX
 AIX/370
 AIX/ESA
 Allegro
 AllianceOS
 Alto OS
 Amiga OS
 Amoeba
 Amstrad
 AMX RTOS
 AngelOS
 Antarctica
 AOS/VS
 Aperios
 Apollo Domain/OS
 ApolloOS
 Apostle
 Archimedes OS
 AROS
 ARTOS
 Asbestos
 Athena
 AtheOS
 AtomsNet
 Atomthreads
 AuroraOS
 B-Free
 Bada
 BAL
 Banyan VINES
 Basic Executive System
 BeIA
 BeOS
 Beowulf
 BKY
 BlueEyedOS
 BOS
 BOS1810
 BoxOS
 BPMK
 bpmk
 BRiX
 BS600
 BS2000
 BSDi
 BugOS
 Calmira
 CCP (Computer Control Program)
 CDOS
 Cefarix
 C Executive
 Chaos
 Chimera
 Chippewa OS
 Choices
 Chorus
 Cinder OS
 Cisco IOS
 Clicker32
 CMW+ (SCO)
 COBRA
 Coherent
 CONSENSYS
 ConvexOS
 Cos
 Cosy
 Counterpoise
 CP/K
 CP/M
 CP/NET
 CP/Z
 CPF (Control Program Facility)
 Cromix
 Cronus
 CSOC
 CTOS
 CTSS
 CX/SX
 Cyber (CDC)
 Cygnus
 DAC
 Darwin
 Data General
 DC/OSx
 DCP
 Degenerate OS
 Delitalk
 Deming OS
 DEMOS
 DesktopBSD
 DESKWORK
 DG/UX
 DIGITAL UNIX
 dingOS
 DK/DOS
 DLD
 DNIX
 Domain OS
 DOS
 DOS2
 DOS 50
 Dosket
 dr'ex
 DR-DOS
 Drops
 Drywell OS
 DS-OS
 DTOS
 DVIX
 DYNIX Unix (Sequent)
 ECL-3211
 eComStation
 eCos
 EduOS
 EGOS
 ekkoBSD
 Elate
 ELKS
 Elysium
 EOS
 EP/IX
 EPOC
 ERaMS
 ERIKA
 EROS
 ESER
 ESIX
 ESKO
 Eumel
 EuNIX
 Exopc
 ExOS
 Express
 Famos
 FDOS
 Fiasco
 Flamethrower
 FlashOS
 FlexOS
 FLP-80 DOS
 Flux
 Flux-Fluke-Flask
 FMS
 Forth
 FreeBSD
 FreeDOS
 FreeDOWS
 FreeVMS
 Frenzy
 FullPliant
 FunatixOS
 FxOS
 GazOS
 GCOS
 GECOS
 GeekOS
 Gemini Nucleus
 Genera
 GEORGE
 GEOS
 GM OS
 GNU Hurd
 GNUstep
 Go
 Goah
 Gould OS
 Grasshopper
 GUIDE
 Haïku
 HA-MSP
 Hactar
 Harmony
 Helios
 HES
 Hive
 HOPE
 HP-87 OS
 HP-UX
 HT-11
 Hurd
 Hurricane
 HydrixOS
 i5/OS
 IBM PC-DOS
 IBSYS
 Icaros Desktop
 ICL Unix
 Immunix
 Inferno
 INMOS
 INTEGRITY RTOS
 Iridium OS
 IRIX
 iRMX
 IRTS
 ISC (Interactive)
 ISIS
 ISSL
 ITRON
 ITS
 JAMB
 JavaOS
 Jbed
 JeniOS
 Jeo-OS
 Jibbed
 JOS
 JTMOS
 JUNOS
 JxOS
 KAOS
 Katix
 Kea
 Kerberos
 KeyKOS
 KOS
 KRONOS
 KROS
 KRUD
 Kylin
 L4
 L13Plus
 LainOS
 LAN Manager
 LDOS
 LegOS
 leJOS
 Linux
 Lisa OS
 LTSS
 LynxOS
 Möbius
 Mach
 Mac OS 8
 Mac OS 9
 Mac OS X
 MANOS
 MaRTE OS
 Maruti
 Masix
 Maverick OS
 MBOS
 MCP (Master Control Program)
 MDOS
 MenuetOS
 Merlin
 Micriµm
 MICRODOS
 MicroVMS
 MikeOS
 Minima
 Minix
 Minux
 Miranda
 Miray µnOS
 MITE 80/IOS
 MK++
 ML
 ModulOS
 Monitor
 MOPS
 MorphOS
 MOS
 MOSIX
 MPE/iX
 MPE OS
 MRT1700
 MS-DOS
 MSOS
 MT809
 Multics
 Mungi
 MUTOS
 muVinix
 MVS
 NachOS
 NCR Unix
 NEC DOS
 NECUX
 Nemesis
 NeOS
 NetBSD
 Netware
 NewDeal
 NEWDOS
 NewOS
 NEWS-OS
 Newton OS
 NexentaOS
 NeXTStep
 NextworksOS
 Nexus
 Nimbus
 Node OS
 NOS
 NOS/BE
 NOS/VE
 Nova
 Novell DOS
 NS/GDOS
 NSK
 NTDIOS
 Nucleus
 Oaesis
 Oasis
 Oberon
 Objex
 Odin
 Omega 4
 OnCore
 On Time RTOS-32
 Opal
 OpenBeOS
 OpenBSD
 OpenDarwin
 OpenRavenscar
 OpenServer
 OpenVision
 OpenVMS
 OppcOS
 OS-2
 OS-9
 OS-C
 OS/2
 OS/2 Warp
 OS/9
 OS/360
 OS/390
 OS/400
 OS/ES
 OS/M
 OS4
 osCAN
 OSE
 OSF/1
 Osx
 OZONE
 PAKOS
 Palm OS
 PAPL
 Paramecium
 ParixOS
 Paros
 PaulOS
 P BASIC
 PC-BSD
 PC-DOS
 PC/M-System
 PDOS
 PEACE
 Pebble
 Pegasos
 PETROS
 Phantom OS
 Phos
 PIOS
 PizziOS
 Plan 9
 Plex86
 PM_SZ_OS
 PocketPC 2003
 PowerMAX
 PowerOS
 PowerSX
 PowerUX
 ProDOS
 Prologue
 Proolix
 ProOSEK
 PSOS
 pSOSystem
 PSU
 PTS DOS
 PublicOS
 PURE
 QDOS
 QNX
 Quadros
 RadiOS
 RBASIC
 RCOSjava
 RDOS
 ReactOS
 REAL-32
 Realogy Real Time Architekt
 REBOL-IOS
 ReWin
 REX-80/86
 REXX/OS
 RHODOS
 RISC OS
 RMOS
 RMS 68k
 Roadrunner
 Rome
 ROME
 RSTS/E
 RSX-11
 RT-11
 RTEL
 RTEMS
 RT Mach NTT
 rtmk
 RTMX
 RTOS-32
 RTOS-UH
 RTS-80
 RTX
 RTXDOS
 RxDOS
 S.Ha.R.K
 Sanos
 SCO OpenServer
 SCOPE
 ScorchOS
 ScottsNewOS
 Scout
 SCP
 SCP (System Control Program)
 SCP-IBE
 Self-R
 SeOS
 Sequent
 SEVMS VAX
 Shark
 SharpOS
 ShawnOS
 SIBO
 Sinclair
 Sinix
 SINTRAN III
 SkyOS
 Slikware
 sMultiTA
 SOBS
 Solaris
 Solar_OS
 Solbourne UNIX
 SOS
 SP6800
 Spice
 Spice/MT
 SPIN
 Spinix
 SPOX
 Spring
 Squeak
 SSP (System Support Program)
 STAR-OS
 STARCOS
 Starplex II OS
 Sting
 StreamOS
 Subsump
 SUMO
 SunMOS
 SunOS
 SunriseOS
 SuperDOS
 SVM
 SVR
 Syllable
 Symbian OS
 SymbOS
 Symobi
 Symphony OS
 Synapse
 System 6 (Mac OS)
 System 7 (Mac OS)
 System V Release
 TABOS
 Tabos
 TalOS
 TAOS
 TENEX
 THE
 Thix
 ThreadX
 ThrillOS
 TI-99 4A
 TinyOS
 TIS APL
 TNIX
 TOPS-10
 TOPS-20
 Topsy
 Tornado
 Torsion
 TOS
 TPF (Transaction Processing Facility)
 TriangleOS
 Tripos
 TRON
 TRS-DOS
 Tru64 UNIX
 TSX-32
 TUD:OS
 TUNES
 TurboDOS
 UberOS
 UCSD-p
 UDOS
 Ultrix
 UMDS
 UMN
 UNI/OS
 Unicos
 UNICOS/lc
 Uni FLEX
 Unisys U5000
 Unix System
 UnixWare
 Unununium
 USIX
 UTS
 UXP/V
 V2 OS
 Vapour
 VERSAdos
 Visopsys
 Visual Network OS
 VM/ESA
 VM/VSE
 VME
 VMS
 VRTX/8002
 VRTX/OS
 VSE
 VSOS
 VSTa
 VTOS
 VxWorks
 WEGA
 WildMagnolia
 Windows 7
 Windows 95
 Windows 98
 Windows 98 SE
 Windows 2000
 Windows Automotive
 Windows CE
 Windows ME
 Windows NT
 Windows Server 2003
 Windows Server 2003 R2
 Windows Server 2008
 Windows Server 2008 R2
 Windows Vista
 Windows XP
 Windows 7
 WinMac
 WIZRD
 x-kernel
 XAOS
 Xenix
 Xinu
 xMach
 XOS
 XTS
 Yamit
 Yaxic
 Yoctix
 z-VM
 z/OS
 Z9001-OS
 ZealOS
 Zeta
 Zeus Zilog
 zeVenOS
 ZMOS
 ZotOS
 ZRTS 800

Wednesday 13 February 2013

#9 How to LogIn to multiple skype accounts at the same time / same PC

  • Right click on the "Skype" Shorcut,
  • Click properties and find Target bar,
  • Add the following string to the end of the text inside the target box, "/secondary", without out couts
     
For example,

Your target box path is

"C:/Program Files/Skype/Skype.exe"

then add "/secondary to the above string.

ie.

"C:/Program Files/Skype/Skype.exe" /secondary
notice that "/secondary" should be appended after the couts.
Click ok.

You're done..

Tuesday 12 February 2013

#8 - Shortcuts for Facebook in Google Chrome & Mozilla Firefox browser.


Alt+m Shift+Alt+m New Message

Alt+0 Shift+Alt+0 Help Center

Alt+1 Shift+Alt+1 Home Page

Alt+2 Shift+Alt+2 Profile Page

Alt+3 Shift+Alt+3 Manage Friend List

Alt+4 Shift+Alt+4 Message List

Alt+5 Shift+Alt+5 Notification Page

Alt+6 Shift+Alt+6 Account Settings

Alt+7 Shift+Alt+7 Privacy Settings

Alt+8 Shift+Alt+8 Facebook Fan Page

Alt+9 Shift+Alt+9 Facebook Terms

Alt+? Shift+Alt+? Search Bo

Friday 8 February 2013

#7 - 25 computer networking tips and tricks

Running a home network is pretty essential in this day and age.
Thankfully, modern hardware and software has reduced the complexities of configuring networks down to a few setup screens, and the relevant hardware often comes free with an internet connection.
If you have multiple computers, the chances are they're already talking to each other, either through wires or wirelessly. However, while your home network might be up and running, optimising it takes some doing. Follow our simple tips to extract the last drop of juice from your network hardware.

1. Change channel number
Wireless routers operate on a fixed channel. Since most routers ship with a pre-selected channel, the wireless signal may interfere with other routers in the vicinity that are operating on the same channel.
Changing the wireless channel from the factory default is a good starting point if your wireless signal strength is poor. 

2. Give the router space to breathe
The biggest advantage of a wireless router is that it can penetrate doors and walls – but that doesn't mean you can just stuff it next to a wall or cordless telephone, or use it as a stand for your stack of DVDs. Treat it with respect.
Try to keep it in a central location, away from other wireless devices; make sure it's not in direct sunlight; lift it off the carpet; and ensure its vents and air holes aren't covered. 

3. Improve reception 
Try as you might, you'll find it's sometimes not possible to put the router in a good spot. One way around the problem is to buy a router with multiple antennas and point them in a variety of directions covering your home.
Alternatively, if you've already got a router, check whether it's possible to upgrade its antennas to something stronger. However, don't get disheartened if your router doesn't have any antennas. A wireless repeater compatible with your router is a perfect solution. 

4. Use WEP
Running an unsecured network will earn you brownie points from neighbours and hackers with cars, but that's about it. Wireless routers support a variety of encryption methods, such as WPA and WEP, but these aren't enabled by default.
WPA2 is the most secure method at the moment, but before deciding on an encryption method, make sure your network cards and adapters support it as well. Bear in mind that older machines – and games consoles such as the Nintendo DS – don't support WPA. 

5. Restrict access to specific PCs
If you really don't want to use encryption, you can force your router to only connect to specific PCs. Your router identifies each computer by the unique MAC address of its network gear. Feed it a list of MAC addresses to connect to and you save yourself the trouble of entering a password each time you log in.
The disadvantage is that you'll have to add the MAC address of any new computer before it can get on your network – which is probably a more annoying way of getting things done. 

6. Disable SSID broadcast
All wireless routers have a Service Set Identifier (SSID) that identifies them to network computers. Routers from the same manufacturer generally ship with the same SSID; 'Netgear' or 'Cisco', for example.
You should first change the SSID to something unique to set your router apart from those of your neighbours. Then, once all your hardware has been set up, it's better to turn off broadcasting the SSID altogether. This ensures your router isn't displayed in the list of available networks, and won't be a target for potential hackers. 

7. Keep the firmware updated
Router manufacturers keep working on firmware, even after hardware has been shipped. In addition to tweaks in the user interface, new versions might make better use of the various components in the router, or add extra features.
Just like with an operating system, it's a good idea to upgrade the firmware of the router regularly – check the manufacturer's website for a new version. In the good old days, there was the risk of a botched firmware upgrade bricking your router, but it's a lot safer today. 

8. Familiarise yourself with the router manager
All routers ship with a browser based manager. To use many of the tips in this article, you'll have to log in to this interface – try typing 192.168.1.1 into your web browser for the most common location.
It's a good idea to familiarise yourself with the various options and settings you can tweak from within this software. Many routers also have detailed documentation that's updated regularly, so hunt out the latest manual online. 

9. Check your connections
There's nothing more irritating than receiving a 'cannot connect to remote machine' error. To ensure a solid connection, use Ethernet cables where possible. It's also a good idea to check the connection between the two PCs with the ping command.
To do this, simply open a command line and type, for instance, ping 192.168.1.2. You'll need to replace the address given here with that of your target machine. Ping works identically on Windows, Mac and Linux. 

10. Forward ports 


Many servers and applications – for example, file-sharing software, FTP servers and music-streaming servers – need to serve people outside the network. These applications accept connections on specific ports.
With port forwarding – check your router's interface – you can poke holes in your router and ask it to direct incoming traffic on a particular port (or, if you wish, a range of ports) to a specific computer that's on the network. 

11. Change DNS providers
DNS is what fetches you a website by translating the human-friendly address, such as www.pcplus.co.uk, into a bunch of machine-friendly numbers. It also displays the '404 page not found' error, corrects misspelt URLs and finds the fastest route to a web server that hosts the site you want to visit, along with lots of other cool things.
Generally, it's up to the ISP to put up a DNS server. However, there are other free services as well, including the likes of OpenDNS and Google Public DNS. 

12. Use USB adapters
These days, it's difficult to find a laptop or netbook without a built-in wireless module, but if you've used one, you'll know that they can't always be relied upon. Network cards with antennas are the best option, but they're really only suitable for desktops.
If you really need both mobility and assurance, make sure you get a USB adapter. Most of them ship with a Windows driver, but many work out-of-the-box on Linux as well. 

13. Enable Dynamic DNS
The Dynamic DNS feature enables you to connect to your computer remotely. Back in the day, when real-estate on the web was expensive, it was a wonderful option to show off your HTML skills and host your own website.
Now, by associating your dynamic IP address with a domain name, DDNS enables you to connect to the internet-exposed home computer from anywhere in the world. In addition to enabling the feature on your router, you'll also have to register with a dynamic DNS provider, such as DynDNS.org. 

14. Save power with Wake-on-LAN
What's the point of keeping a print server on when there's nothing to print? The smart way to save energy is to use the Wake-on- LAN feature of the network card. Thanks to this, you can put the machine to sleep after it's been configured to wake upon detecting network activity. 

15. Encrypt your online activity
With the range of snooping tools now available, it isn't safe to do anything online without covering your footprints. There are lots of tools that promise to encrypt your online activity, making it completely unintelligible to anyone who might be listening in.
Some of the best ones to try are the Enigmail plug-in for Thunderbird, Psi for Google Talk and FireGPG, available for Gmail. 

16. Get a Firewall distro
You can configure a firewall on a Windows or Linux machine, and there are also a bunch of third-party software firewalls available. However, building a firewall isn't easy. If you're serious about putting one up, download a dedicated firewall distro, such as Ebox. 

17. Install the software
Ebox is distributed as a Live CD ISO and there are VirtualBox/VMWare images as well. It's based on Ubuntu Server 8.04. You can also pull in Ebox packages to a standard Ubuntu Server 10.04 installation. You can find it at www.ebox-platform.com

18. Configure settings
Ebox can be adapted flexibly to your network. You can use it to restrict services that can be accessed and slice the network to keep some areas more secure than others. The distro runs a browser-based interface for adding, removing and configuring the components. 

19. Filter content
Besides the firewall, intrusion detection (via Snort) and filtering content (via DansGuardian) are two other highlights of the distro. DansGuardian can also plug into the ClamAV antivirus scanner and filter content based on known virus signatures. 

20. Exploit other features
In case you're still not satisfied, Ebox can also act as a gateway and provide a host of other services. It bundles various applications that enable you to turn your network into a VPN, host XMPP chat sessions or run a Postfix mail server, a Squid web proxy and more. 

21. Turn on UPnP
Universal Plug and Play helps smart devices that support UPnP to discover each other without any user intervention. Once turned on from within your router, UPnP enables a compatible infrared device, a Bluetooth phone or a FireWire camera to see and talk to each other. 

22. Write files remotely
The most logical use of a network is to share files. This is the job of the SMB protocol. Thanks to it, you'll be able to write files to a remote network share via Network Neighbourhood. On Linux, the SMB protocol is implemented by Samba.

23. Share printers remotely
In addition to sharing files, SMB can be used to share printers attached to a Windows machine. Once configured via the Windows Control Panel, a printer can be used to accept print orders or even be managed from a remote machine, irrespective of its operating system. 

24. Format shareable partitions as FAT
PCs running Windows can easily see each other and share files. For Linux or Mac machines, ensure the partitions are formatted with the FAT filesystem. Create them as Samba shares and they'll show up under Network Neighbourhood. 

25. Plug in USB drives
Once, if you wanted to share files on the network, a network-attached-storage, or NAS, device was the best bet. Not any more. New routers enable you to plug in one or more USB devices that are automatically accessible by all the users connected to the router.